Publications

Found 388 results
Author [ Title(Desc)] Type Year
Filters: Author is Scott Shenker  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Moulin, H., & Shenker S. J. (2001).  Strategyproof Sharing of Submodular Costs: Budget Balance Versus Efficiency. Economic Theory. 18(3), 511-533.
Cocchi, R., Estrin D., Shenker S. J., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Clark, D. D., Shenker S. J., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
T
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2015).  Taking an AXE to L2 Spanning Trees.
Shenker, S. J. (1990).  A Theoretical Analysis of Feedback Flow Control. Proceedings of the ACM SIGCOMM Symposium on Communications Architectures & Protocols. 156-165.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Widom, M., & Shenker S. J. (1984).  Topological Phase Transitions. 46-51.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Demmer, M., Fall K., Koponen T., & Shenker S. J. (2007).  Towards a Modern Communications API. Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets-VI). 1-7.
Subramanian, L., Caesar M., Handley M., Mao M., Shenker S. J., & Stoica I. (2004).  Towards a Next Generation Inter-domain Routing Protocol.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S. J., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S. J., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems.
Bergemann, D., Feigenbaum J., Shenker S. J., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S. J., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Ermolinskiy, A., Katti S., Shenker S. J., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Shenker, S. J., & Breslau L. (1995).  Two Issues in Reservation Establishment. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95). 14-26.
U
Bajaj, S., Breslau L., & Shenker S. J. (1998).  Uniform versus Priority Dropping for Layered Video. ACM Computer Communication Review. 28, 131-143.

Pages